title: Configuring global security settings for your organization
shortTitle: Configure global settings
intro: >-
Customize {% data variables.product.prodname_AS %} features to strengthen the
security of your organization.
permissions: '{% data reusables.permissions.security-org-enable %}'
versions:
feature: security-configurations
topics:
- Code Security
- Secret Protection
- Organizations
- Security
About {% data variables.product.prodname_global_settings %}
Alongside {% data variables.product.prodname_security_configurations %}, which determine repository-level security settings, you should also configure {% data variables.product.prodname_global_settings %} for your organization. {% data variables.product.prodname_global_settings_caps %} apply to your entire organization, and can customize {% data variables.product.prodname_AS %} features based on your needs. {% ifversion ghes < 3.16 %}You can also create a team of security managers to monitor and maintain your organization's security.{% endif %}
Accessing the {% data variables.product.prodname_global_settings %} page for your organization
{% data reusables.profile.access_org %} {% data reusables.organizations.org_settings %}
- In the "Security" section of the sidebar, select the {% data variables.product.UI_advanced_security %} dropdown menu, then click {% data variables.product.prodname_global_settings_caps %}.
Configuring global {% data variables.product.prodname_dependabot %} settings
{% data reusables.dependabot.dependabot-overview %}
You can customize several {% data variables.product.prodname_global_settings %} for {% data variables.product.prodname_dependabot %}:
- Creating and managing {% data variables.dependabot.auto_triage_rules %}
- Grouping {% data variables.product.prodname_dependabot %} security updates{% ifversion dependabot-on-actions-opt-in %}
- Enabling dependency updates on {% data variables.product.prodname_actions %} runners{% endif %}{% ifversion dependabot-arc-support %}
- Configuring the runner type for {% data variables.product.prodname_dependabot %}{% endif %}{% ifversion fpt %}
- Granting {% data variables.product.prodname_dependabot %} access to private repositories{% else %}
- Granting {% data variables.product.prodname_dependabot %} access to private and internal repositories{% endif %}
Creating and managing {% data variables.dependabot.auto_triage_rules %}
You can create and manage {% data variables.dependabot.auto_triage_rules %} to instruct {% data variables.product.prodname_dependabot %} to automatically dismiss or snooze {% data variables.product.prodname_dependabot_alerts %}, and even open pull requests to attempt to resolve them. To configure {% data variables.dependabot.auto_triage_rules %}, click {% octicon "gear" aria-label="Configure Dependabot rules" %}, then create or edit a rule:
- You can create a new rule by clicking New rule, then entering the details for your rule and clicking Create rule.
- You can edit an existing rule by clicking {% octicon "pencil" aria-label="Edit CURATED-OR-CUSTOM rule" %}, then making the desired changes and clicking Save rule.
For more information on {% data variables.dependabot.auto_triage_rules %}, see AUTOTITLE and AUTOTITLE.
Grouping {% data variables.product.prodname_dependabot_security_updates %}
{% data variables.product.prodname_dependabot %} can group all automatically suggested security updates into a single pull request. To enable grouped security updates, select Grouped security updates. For more information about grouped updates and customization options, see AUTOTITLE.
{% ifversion dependabot-on-actions-opt-in %}
Enabling dependency updates on {% data variables.product.prodname_actions %} runners
If both {% data variables.product.prodname_dependabot %} and {% data variables.product.prodname_actions %} are enabled for existing repositories in your organization, {% data variables.product.company_short %} will automatically use {% data variables.product.company_short %}-hosted runners to run dependency updates for those repositories.
Otherwise, to allow {% data variables.product.prodname_dependabot %} to use {% data variables.product.prodname_actions %} runners to perform dependency updates for all existing repositories in the organization, select "{% data variables.product.prodname_dependabot %} on Actions runners".
For more information, see AUTOTITLE.
{% endif %}
{% ifversion dependabot-arc-support %}
Configuring the runner type for {% data variables.product.prodname_dependabot %}
You can configure which type of runner {% data variables.product.prodname_dependabot %} uses to scan for version and security updates. By default, {% data variables.product.prodname_dependabot %} uses standard {% data variables.product.company_short %}-hosted runners. You can configure {% data variables.product.prodname_dependabot %} to use self-hosted runners with custom labels, which allows you to integrate with existing runner infrastructure such as {% data variables.product.prodname_actions_runner_controller %} (ARC).
- For security reasons, {% data variables.product.prodname_dependabot %} uses {% data variables.product.company_short %}-hosted runners for public repositories, even when you configure labeled runners.
- Labeled runners do not work for public repositories.
To configure the runner type:
- Under "{% data variables.product.prodname_dependabot %}", next to "Runner type", select {% octicon "pencil" aria-label="Edit runner type" %}.
- In the "Edit runner type for {% data variables.product.prodname_dependabot %}" dialog, select the runner type you want {% data variables.product.prodname_dependabot %} to use:
- Standard {% data variables.product.company_short %} runner.
- Labeled runner: If you select this option, {% data variables.product.prodname_dependabot %} will use self-hosted runners that match the label you specify.
- If you selected Labeled runner:
- In "Runner label", enter the label assigned to your self-hosted runners. {% data variables.product.prodname_dependabot %} will use runners with this label. By default, the
dependabotlabel is used, but you can specify a custom label to match your existing runner infrastructure. - Optionally, in "Runner group name", enter the name of a runner group if you want to target a specific group of runners.
- In "Runner label", enter the label assigned to your self-hosted runners. {% data variables.product.prodname_dependabot %} will use runners with this label. By default, the
- Click Save runner selection.
{% endif %}
{% ifversion dependabot-on-actions-self-hosted %}
For more information about configuring self-hosted runners for {% data variables.product.prodname_dependabot %}, see AUTOTITLE.
{% endif %}
Granting {% data variables.product.prodname_dependabot %} access to private {% ifversion ghec or ghes %}and internal {% endif %}repositories
To update private dependencies of repositories in your organization, {% data variables.product.prodname_dependabot %} needs access to those repositories. To grant {% data variables.product.prodname_dependabot %} access to the desired private {% ifversion ghec or ghes %}or internal {% endif %}repository, scroll down to the "Grant {% data variables.product.prodname_dependabot %} access to private repositories" section, then use the search bar to find and select the desired repository. Be aware that granting {% data variables.product.prodname_dependabot %} access to a repository means all users in your organization will have access to the contents of that repository through {% data variables.product.prodname_dependabot_updates %}. For more information about the supported ecosystems for private repositories, see AUTOTITLE.
Configuring global {% data variables.product.prodname_code_scanning %} settings
{% data reusables.code-scanning.about-code-scanning %}
{% ifversion ghes > 3.16 %}
You can recommend that repositories in your organization use the "Extended" query suite instead of the "Default" query suite for broader {% data variables.product.prodname_code_scanning %} coverage across your organization. See Recommending the extended query suite for default setup.
{% else %}
You can customize several {% data variables.product.prodname_global_settings %} for {% data variables.product.prodname_code_scanning %}:
{% ifversion code-scanning-autofix %}* Enabling {% data variables.copilot.copilot_autofix_short %} for {% data variables.product.prodname_codeql %}{% endif %}
- Recommending the extended query suite for default setup{% ifversion ghes < 3.17 %}
- Setting a failure threshold for {% data variables.product.prodname_code_scanning %} checks in pull requests.{% endif %}
{% endif %}
Recommending the extended query suite for default setup
{% data variables.product.prodname_code_scanning_caps %} offers specific groups of {% data variables.product.prodname_codeql %} queries, called {% data variables.product.prodname_codeql %} query suites, to run against your code. By default, the "Default" query suite is run. {% data variables.product.company_short %} also offers the "Extended" query suite, which contains all the queries in the "Default" query suite, plus additional queries with lower precision and severity. To suggest the "Extended" query suite across your organization, select Recommend the extended query suite for repositories enabling default setup. For more information on built-in query suites for {% data variables.product.prodname_codeql %} default setup, see AUTOTITLE.
{% ifversion code-scanning-autofix %}
Enabling {% data variables.copilot.copilot_autofix_short %} for {% data variables.product.prodname_codeql %}
You can select {% data variables.copilot.copilot_autofix_short %} to enable {% data variables.copilot.copilot_autofix_short %} for all the repositories in your organization that use {% data variables.product.prodname_codeql %} default setup or {% data variables.product.prodname_codeql %} advanced setup. {% data variables.copilot.copilot_autofix_short %} is an expansion of {% data variables.product.prodname_code_scanning %} that suggests fixes for {% data variables.product.prodname_code_scanning %} alerts. For more information, see AUTOTITLE.
{% endif %}
{% ifversion ghes < 3.17 %}
Setting a failure threshold for {% data variables.product.prodname_code_scanning %} checks in pull requests
You can choose the severity levels at which {% data variables.product.prodname_code_scanning %} check runs on pull requests will fail. To choose a security severity level, select the Security: SECURITY-SEVERITY-LEVEL dropdown menu, then click a security severity level. To choose an alert severity level, select the OTHER: ALERT-SEVERITY-LEVEL dropdown menu, then click an alert severity level. For more information, see AUTOTITLE.
{% endif %}
Configuring global {% data variables.product.prodname_secret_scanning %} settings
{% data reusables.security-configurations.secret-scanning-security-configs-summary %}
You can customize several {% data variables.product.prodname_global_settings %} for {% data variables.product.prodname_secret_scanning %}:
- Adding a resource link for blocked commits
- Defining custom patterns{% ifversion push-protected-pattern-configuration %}
- Specifying patterns to include in push protection{% endif %}
Adding a resource link for blocked commits
To provide context for developers when {% data variables.product.prodname_secret_scanning %} blocks a commit, you can display a link with more information on why the commit was blocked. To include a link, select Add a resource link in the CLI and the web UI when a commit is blocked. In the text box, type the link to the desired resource, then click {% ifversion fpt or ghec or ghes > 3.15 %}Save Link{% else %}Save{% endif %}.
Defining custom patterns
You can define custom patterns for {% data variables.product.prodname_secret_scanning %} with regular expressions. Custom patterns can identify secrets that are not detected by the default patterns supported by {% data variables.product.prodname_secret_scanning %}. To create a custom pattern, click New pattern, then enter the details for your pattern and click Save and dry run. For more information on custom patterns, see AUTOTITLE.
{% ifversion push-protected-pattern-configuration %}
Specifying patterns to include in push protection
{% data reusables.secret-scanning.push-protected-pattern-configuration-org-enterprise-preview %}
You can customize which secret patterns are included in push protection, giving security teams greater control over what types of secrets are blocked in the repositories in your organization.
- Under "Additional settings", in the "{% data variables.product.prodname_secret_scanning_caps %}" section and to the right of "Pattern configurations", click {% octicon "gear" aria-label="The Gear icon" %}.
- In the page that gets displayed, make the desired changes in the "Organization setting" column. {% data reusables.secret-scanning.pattern-enablement-org-enterprise %}
{% endif %}
Creating security managers for your organization
The security manager role grants members of your organization the ability to manage security settings and alerts across your organization. Security managers can view data for all repositories in your organization through security overview.
To learn more about the security manager role, see AUTOTITLE.
{% ifversion fpt or ghec or ghes > 3.15 %}
To assign the security manager role, see AUTOTITLE.
{% else %}
To grant all members of a team the security manager role, in the "Search for teams" text box, type the name of the desired team. In the dropdown menu that appears, click the team, then click I understand, grant security manager permissions.
{% endif %}